Source mc mcse Certification Resources Physical Security – physical security is just as it sounds, locks on the doors, cameras everywhere, and so forth.
Posts By: gol
CompTIA Network+ | Microsoft MTA Networking: Methods of User Authentication
User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input. Source mc mcse Certification Resources PKI (Public Key Infrastructure) – A public key infrastructure (PKI) is the combination of software,… Read more »
CompTIA Network+ | Microsoft MTA Networking: Network Access Security
Source mc mcse Certification Resources ACL (Access Control List) – An ACL is a table in an operating system or network device (such as a router) that denies or allows access to resources.
CompTIA Network+ | Microsoft MTA Networking: Hardware Tools
Source mc mcse Certification Resources Cable Testers – Cable testers are electronic devices used to test a cable’s integrity by checking for opens and shorts which can cause connectivity problems.
CompTIA Network+ | Microsoft MTA Networking: Firewalls
Source mc mcse Certification Resources Application Layer vs. Network Layer – An application layer firewall works at the application layer of a protocol stack.
CompTIA Network+ | Microsoft MTA Networking: Troubleshoot Common Connectivity Issues and Select an Appropriate Solution
Source mc mcse Certification Resources Crosstalk Symptoms: Slow network performance and/or an excess of dropped or unintelligible packets. In telephony applications, users hear pieces of voice or conversations from a separate line.
CompTIA Network+ | Microsoft MTA Networking: Implement the Following Network Troubleshooting Methodology
Source mc mcse Certification Resources Gather Information on the Problem In a contact center network, problems are typically discovered and reported by one of the following types of users:
CompTIA Network+ | Microsoft MTA Networking: Parameters Influencing Quality of Service(QOS)
Source mc mcse Certification Resources Bandwidth – is the average number of bits that can be transmitted from the source to a destination over the network in one second.
CompTIA Network+ | Microsoft MTA Networking: Different Methods and Rationales for Network Performance Optimization
Source mc mcse Certification Resources Quality of Service – (QoS) is a set of parameters that controls the level of quality provided to different types of network traffic.
Cisco CCNA Router on Stick

Follow @ASM_Educational Cisco CCNA-Router on Stick Inter VLAN Communication (Router on Stick) Earlier we built and tested the following topology:
CompTIA Network+ | Microsoft MTA Networking: OSI model
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology.
CompTIA Network+ | Microsoft MTA Networking: Specialized Network Devices
Multilayer Switch – A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
CompTIA Network+ | Microsoft MTA Networking: Common Network Devices
Hub – A physical layer network device used to connect multiple Ethernet devices together.
CompTIA Network+ | Microsoft MTA Networking: Install components of Wiring Distribution
Vertical Cross Connect – is a location within a building where cables originate and / or are terminated, reconnected using jumpers or pass throughs or are connected to patch panels or other similar devices where the locations are from upper or lower floors in the building.
CompTIA Network+ | Microsoft MTA Networking: Common Logical Network Topologies
[bs_icon name=”glyphicon glyphicon-chevron-right”] Peer to Peer – A peer to peer network is one in which lacks a dedicated server and every computer acts as both a client and a server.
CompTIA Network+ | Microsoft MTA Networking: LAN Technology Types and Properties
Ethernet – Ethernet is the most widely-installed local area network ( LAN) technology.
CompTIA Network+ | Microsoft MTA Networking: WAN Technology Types and Properties
[bs_icon name=”glyphicon glyphicon-chevron-right”] Frame Relay – Frame relay is a secure, private network that utilizes a logical path or “virtual circuit” to allocate bandwidth for high performance transmissions.
CompTIA Network+ | Microsoft MTA Networking: Wiring Standards
568A and 568B – The number 568 refers to the order in which the individual wires inside a CAT 5 cable are terminated.
CompTIA Network+ | Microsoft MTA Networking: Standard Cable Types and Their Properties
Cable Types :
CompTIA Network+ | Microsoft MTA Networking: Characteristics of Wireless Standards
Wireless networks allow computers to comunicate without the use of cables using IEEE 802.11 standards, also known as Wi-Fi.
CompTIA Network+ | Microsoft MTA Networking: Common Physical Network Topologies
[bs_icon name=”glyphicon glyphicon-chevron-right”] Introduction To Network
CompTIA Network+ | Microsoft MTA Networking: Properties of Routing
[bs_icon name=”glyphicon glyphicon-chevron-right”] The Purpose and Properties of Routing
CompTIA Network+ | Microsoft MTA Networking: Common IPv4 and IPv6 Routing Protocols
Common IPv4 and IPv6 Routing Protocols
CompTIA Network+ | Microsoft MTA Networking: Addressing Technologies
Proper Use of Addressing Technologies
CompTIA Network+ | Microsoft MTA Networking: IP Address Formats
Identify the Following Address Formats
CompTIA Network+ | Microsoft MTA Networking: Command Line Interface Tools
Traceroute – A command-line troubleshooting tool that enables you to view the route to a specified host. This will show how many hops the packets have to travel and how long it takes. In Windows operating systems, the command used is “tracert”.
CompTIA Network+ | Microsoft MTA Networking: Common Networking Protocols
Common Networking Protocols
CompTIA Network+ | Microsoft MTA Networking: Troubleshooting
Here are the steps for troubleshooting a network
CompTIA Sec+ | Microsoft MTA Security: Exam prepration and Questions

1. Your manager asks you to implement a system that can filter out unwanted content, such as viruses and unproductive Internet content. The best way to accomplish this would be through a system that implements a:
CompTIA Sec+ | Microsoft MTA Security: Certification Cram Guide & Study Notes
In this cram guide, we would like to give you some short tips on what to study for the Security+ exam to ensure a great score.
CompTIA Sec+ | Microsoft MTA Security: Security Topologies
One of the most essential portions of information security is the design and topology of secure networks. What exactly do we mean by “topology?” Usually, a geographic diagram of a network comes to mind.
CompTIA Sec+ | Microsoft MTA Security: Email and Application Security
Some of the Security+ exam will test you on your knowledge of some basic email, Internet, and application security issues. Although the amount of detail of knowledge that is required is quite minimal, you must still have a working knowledge of some simple email and application security concepts.
CompTIA Sec+ | Microsoft MTA Security: Organizational Security

Physical Security Physical security refers to the aspects of information security that are related to physical threats, such as fire or natural disasters. We will cover some basic physical security threats below:
CompTIA Sec+ | Microsoft MTA Security: Public Key Cryptography
Public Key Cryptography is a widely-applied form of cryptography commonly utilized in many network transactions.
CompTIA Sec+ | Microsoft MTA Security: Symmetric Key Cryptography
In here we will learn about different symmetric key algorithms and their key features. More importantly, we will learn about some more key concepts related to cryptography as it applies to both symmetric and asymmetric algorithms.
CompTIA Sec+ | Microsoft MTA Security: Networking Overview
Networking Overview In subsequent chapters of this study guide, we will take a look at different security topologies or ways that networks can be set up with security in mind.
CompTIA Sec+ | Microsoft MTA Security: Firewall
[bs_icon name=”glyphicon glyphicon-chevron-right”] What is a Firewall? A firewall is any hardware or software designed to prevent unwanted network traffic. Some firewalls are simplistic in nature;
CompTIA Sec+ | Microsoft MTA Security: Cryptography
[bs_icon name=”glyphicon glyphicon-chevron-right”] Introduction to Cryptography
CompTIA Sec+ | Microsoft MTA Security: Malicious Software
Viruses, Trojan Horses, Worms Despite all the hype about viruses and worms, the Security+ exam actually does not heavily test on viruses and the like.
CompTIA Sec+ | Microsoft MTA Security: Remote Access
One of the most ever-present and ancient uses of the Internet and networking has been to provide remote access to networks or network resources.
CompTIA Sec+ | Microsoft MTA Security: kinds of attacks
A key aspect to any war is to know your enemy. If you consider the battle against malicious users a war, then understanding the attacks that they use is crucial.
CompTIA Sec+ | Microsoft MTA Security: Incident response
Incident response [bs_icon name=”glyphicon glyphicon-chevron-right”] Concept and procedures
CompTIA Sec+ | Microsoft MTA Security: Protocols
SNMP: It (SNMP) is a mainstream convention for system administration. It is utilized for gathering data from, and designing, system gadgets, for example, servers, printers, centers, switches, and switches on an Internet Protocol (IP) system.
CISSP LANs and Their Components
A local area network (LAN) is a critical component of a modern data network. A LAN is comprised of one or more computers, a communication protocol, a network topology, and cabling or a wireless network to connect the systems.
CISSP System Validation
No system or architecture will ever be completely secure; there will always be a certain level of risk.
CISSP Security Models of Control
Security Models of Control Security models of control are used to determine how security will be implemented, what subjects can access the system, and what objects they will have access to. Simply stated, they are a way to formalize security policy.
CISSP Security Mechanisms
Although a robust architecture is a good start, real security requires that you have security mechanisms in place to control processes and applications. Some good security mechanisms are described in the following sections.
CISSP Computer System Architecture
Computer System Architecture At the core of every computer system is the CPU and hardware that make it run.
CISSP Penetration Testing
Penetration testing is a series of activities undertaken to identify and exploit security vulnerabilities.
CompTIA Sec+ | Microsoft MTA Security: Tunneling
Tunneling, VPN, and IPSec